Security Requirements for Routing Protocols draft-puig-rpsec-generic-requirements-01 Jean-Jacques Puig IETF 58 - RPSEC Working Group Wednesday, November 12 Hilton, Minneapolis, MN, USA
Goals ? •
Requirements on the (inner-)security of routing protocols.
•
Requirements on the secure operation of routing protocols (through the device).
These are NOT requirements on forwarding security. [Section 2] states goals of the doc.
2 / 11
Relation with the Threats doc [Section 3] divides threats into 2 categories: •
Elected for mitigation -> Strong requirements (MUSTs & SHOULDs).
•
Other threats -> Weak requirements (MAYs & CANs) or NO requirements at all.
[Appendix B] reserved for a verbose description of how requirements address each particular threat. Within the document, references to particular threats addressed by a requirement. List of threats {,,,} addressed by a particular requirement ? Threats doc and Requirements doc should be considered as companion documents. 3 / 11
A Model for Routing Protocols ? •
Planes division.
•
Functional approach.
•
Data presentation (Path, Attributes, Reachability info).
4 / 11
Requirements Feedback needed on requirements granularity. It is useless to consider requirements without proper agreement on stated goals and on which threats are most important. Future formulation shall lay emphasis on short, straight requirements. Coherence with other drafts or docs (ex: from RRG).
5 / 11
Related Considerations •
Transport Subsystem (includes neighbors addressability).
•
Cryptography side-effects.
6 / 11
Active Participation to overall security •
Detection of failures (active/passive checks, error messages, auditable events).
Failing participants which were excluded should be offered occasions to participate again.
7 / 11
Local Resources Exhaustion Hardware considerations •
Buffers / Queues.
•
CPU Cycles.
•
Bandwidth.
Logic considerations •
Checks before commits to underlying databases.
•
Appropriate persistence of routing information wrt trust.
•
Tips in order to avoid databases overflows.
8 / 11
Inter Domain Added complexity. A lot of work need to be done on this.
9 / 11
Editorial tags •
[OLD] precedes the old version of the next paragraph.
•
[TBD] stands for 'To Be Discussed' or 'To Be Decided'.
10 / 11
All we need is YOU 1. Agree on stated goals. 2. Agree on threats selection. 3. Feedback on routing protocols parts (functions, route descriptions); granularity. 4. Express your opinion on requirements. General feedback.
Unlike Distance Vector routers, Link State routers have a complete picture ... graph of the internetwork, Using Dijkstra algorithm each router calculates.
Dec 15, 2004 - test case generation, even considering that state-of-the-art tools in this ... A B model for ensuring soundness of the Java card virtual machine.
Submitted to Mathematics Department, Faculty of Science, Minufiya University In partial fulfillment of ..... Show how node n1 join to network by using MCT. 101.
cnsure that a join or leave event does not require widespread changes in the ...... (43) C. Hedrick, "Routing Information Protocol," RFC 1058, June 1988. 144) S ...
suitable for ad hoc wireless networks because of wireless routes existence. .... based approach is the second answer of that question. .... 61â66, August 1994.
Complying with all applicable copyright laws is the responsibility of .... did not break the already existing infrastructure and client services. 3. Functional tests .... HTTP location mentioned in client's certificate under the Details tab. â Wire
pervious concrete with smooth surfaces. Environmental engineering concrete structures for the contain- ment, treatment, or transmission of liquid, wastewater, ...
up connections with healthcare providers, a range of home automation and .... Everything is at http://eugen.dedu.free.fr/publi/nca18.pdf ...... we will use the âstableâ version from Oracle, v1.1, specification (2002, 125 pages) and tutorial ...
Protection des systèmes de stockage de données. Les offres de service ... interne plutôt que d'en faire l'acquisition auprès de sociétés tierces. Les mêmes ...
Moving people, equipment, and ... not to move when their involvement in a team ends. Even- tually ..... at his design and suggest a solution to a tricky problem.
New parts for sensor requirements and user needs chapter (Bernd ..... Object Tracking and Classification. Scene Model .... GPS or GALILEO provides global location of the host vehicle. However ...... The following aspects are covered manual.
Take home message. Questions for you: If you want to annotate your Crete 2005 holiday video and pictures tomorrow Å Does a mm annotation vocabulary exist ...
â¢Multimedia presentation don't resize well. â¢Consistency is harder .... Time-based Hypermedia. In: The Twelfth International World Wide Web Conference 2003 ...
attracted public attention but also to better describe diseases considered commonplace in our society, such as ear infections. A unique bacterial organism, ...
tracking application, using the process introduced in Chapter 2, "Gathering Require- ments with ... CUSTOMER: It is an Excel spreadsheet tar each half-month.
Dec 22, 1998 - Abstract: Guidance for the development of the set of requirements, System Requirements Speci- fication (SyRS), that will satisfy an expressed ...
The approach presented in this document relies on Theodore ``The Tool'' works as a student at the MIT. This document and inner images are available under the ...
Recent developments in intelligent transport system technologies allow fuel savings by guiding the driver through routes avoiding road traffic, while taking into ...
These data have been pre-processed by Song et al. in their prior work .... tion in order to transfer its bundle. ..... a node may transfer a bundle to a node that belongs to the .... [15] N. Eagle and A. Pentland, âSocial serendipity: Mobilizing so